ISIS Suspect Was Sending Encrypted Emails

A senior Indian National Ivestigations Agency official said that accused had used tutanota.com, a secure encryption mail to be in touch with his handler abroad.

The National Investigation Agency (NIA) recently revealed that Ibrahim Yazdani, the Hyderabad youth arrested for his alleged links to Islamic State of Iraq and Syria, was sending encrypted emails to his Syria-based handler through a website that specialises in security and privacy of users. The probe agency further revealed details on purchases made by the other accused arrested by the agency recently.

A senior NIA official said that accused Ibrahim had used tutanota.com, a secure encryption mail to be in touch with his handler abroad. "The co-ordinates of places where logistics like weapons, urea etc. were to be delivered, were sent to him by his handler through this email, "said the officer. Developed by a German Company named Tutao Gmbh, Tutanota is an open-source end-to-end encrypted email software and hosts secure email service.

The agency suspects that Ibrahim was using the website to interact with Shafi Armar, who NIA believes to be the chief recruiter for NIA.Hyderbad resident, Ibrahim Yazdani, who was arrested by NIA along with four others including his brother Iliyas, is believed to be the alleged head of the ISIS module which had owed allegiance to Abu Bakr Baghdadi.

Ibrahim's younger brother, Iliyas, who was among the five arrested youth in Hyderabad had allegedly made some purchases before plans of carrying out terror attacks across the city. An NIA official told dna that Ilyas had purchased the weighing machine from a local shop at biwi bazar for weighing explosive precursors and chemicals.

While 30-year-old Ibrahim Yazdani, who is said to be a computer engineer by profession, his younger brother Iliyas is said to have dropped out of his graduation course and was working in Shalimar Online Seva, which is located close to the local police station in Talab Katta area of Hyderabad. Shalimar Online Seva, according to its online description, is like many private vendors used by the government to distribute pan cards, birth certificates and other identification documents.

The agency further said that Fahad, another arrested accused in the case, had procured nine Aircel pre-activated sims from promotional temporary stall at Charminar bus stop. "Subsequently he had purchased five Chinese mobile phones from a mobile shop at Charminar bus stop for use in their planning and operations, "said an official.

DNIndia: http://bit.ly/2bg3ABb

« Rio Olympics Hacking Threats
The Race To Regulate Self-Driving Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

KeepItSafe

KeepItSafe

KeepItSafe is a premium, white-glove service for online backup, disaster recovery and business continuity

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Heimdal Security

Heimdal Security

Heimdal Security provides proactive protection against cyber threats including ransomware, exploit kits and financial malware.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Knightshield Services

Knightshield Services

Knightshield Services provides services and solutions in the areas of Security & Logistics, Cyber Security and Blockchain.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.